search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Jakarta Tomcat serves JSP source code when supplied malformed HTTP request

Vulnerability Note VU#208131

Original Release Date: 2002-09-14 | Last Revised: 2003-09-23

Overview

Tomcat does not adequately validate HTTP requests and may reveal JSP source code if supplied a malformed HTTP request.

Description

JavaServer Pages (JSP) is a technology that allows for the creation of dynamic web content. The Apache Jakarta Project implementation of JSP is known as Tomcat.

Tomcat does not enforce HTTP request syntax with regard to protocol name and version number. Furthermore, if a received HTTP request for a JSP is missing the protocol name and version number string (i.e. "HTTP/1.1"), Tomcat will serve the JSP source file instead of executing the file and serving the servlet output.

Impact

Attackers may gain read access to JSP source code on the server.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Vendor Information

208131
 

Apache Unknown

Notified:  September 12, 2002 Updated: September 22, 2003

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Eric Daniel Mauricio for reporting this vulnerability.

This document was written by Shawn Van Ittersum and Jeffrey P. Lanza.

Other Information

CVE IDs: None
Severity Metric: 4.80
Date Public: 2001-04-03
Date First Published: 2002-09-14
Date Last Updated: 2003-09-23 02:15 UTC
Document Revision: 14

Sponsored by CISA.